General

  • Target

    kiki.exe

  • Size

    72KB

  • Sample

    240510-n39shach7s

  • MD5

    a99f3b501d87f7e5ff90b97f1f4a820f

  • SHA1

    5db5c4aac55db25894eae9f3ddba7a2a582459b3

  • SHA256

    a30e13548b7ec9c749cc9ce33351f0b701b4f922f303bd6679958ed791a7b927

  • SHA512

    b1f0a17126ba765aa417edf031a5f7f1e1958ab133a8e47a9e2039245578e1d44c9c4a2ea1b119802dd99007233fb49bb3cf2367a0a825850dc9050c7bc2e1cc

  • SSDEEP

    1536:IRduIzhHnT8LedCMWnbh56FtVMb+KR0Nc8QsJq39:U4+HnTbdC1DCPe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

windows/reverse_tcp

C2

10.10.79.149:9666

Targets

    • Target

      kiki.exe

    • Size

      72KB

    • MD5

      a99f3b501d87f7e5ff90b97f1f4a820f

    • SHA1

      5db5c4aac55db25894eae9f3ddba7a2a582459b3

    • SHA256

      a30e13548b7ec9c749cc9ce33351f0b701b4f922f303bd6679958ed791a7b927

    • SHA512

      b1f0a17126ba765aa417edf031a5f7f1e1958ab133a8e47a9e2039245578e1d44c9c4a2ea1b119802dd99007233fb49bb3cf2367a0a825850dc9050c7bc2e1cc

    • SSDEEP

      1536:IRduIzhHnT8LedCMWnbh56FtVMb+KR0Nc8QsJq39:U4+HnTbdC1DCPe0Nc8QsC9

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

MITRE ATT&CK Matrix

Tasks